Total
27865 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-1999-1431 | 1 Microsoft | 1 Zero Administration Kit | 2016-10-17 | 4.6 MEDIUM | N/A |
| ZAK in Appstation mode allows users to bypass the "Run only allowed apps" policy by starting Explorer from Office 97 applications (such as Word), installing software into the TEMP directory, and changing the name to that for an allowed application, such as Winword.exe. | |||||
| CVE-1999-1433 | 1 Hp | 1 Jetadmin | 2016-10-17 | 7.2 HIGH | N/A |
| HP JetAdmin D.01.09 on Solaris allows local users to change the permissions of arbitrary files via a symlink attack on the /tmp/jetadmin.log file. | |||||
| CVE-1999-1434 | 1 Slackware | 1 Slackware Linux | 2016-10-17 | 7.2 HIGH | N/A |
| login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server. | |||||
| CVE-1999-1435 | 1 Nec | 1 Socks 5 | 2016-10-17 | 7.2 HIGH | N/A |
| Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables. | |||||
| CVE-1999-1439 | 1 Gcc | 1 Gcc | 2016-10-17 | 2.1 LOW | N/A |
| gcc 2.7.2 allows local users to overwrite arbitrary files via a symlink attack on temporary .i, .s, or .o files. | |||||
| CVE-1999-1440 | 1 Mirabilis | 1 Icq 98a | 2016-10-17 | 5.1 MEDIUM | N/A |
| Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client. | |||||
| CVE-1999-1441 | 1 Linux | 1 Linux Kernel | 2016-10-17 | 2.1 LOW | N/A |
| Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it. | |||||
| CVE-1999-1443 | 1 Micah Software | 1 Full Armor | 2016-10-17 | 4.6 MEDIUM | N/A |
| Micah Software Full Armor Network Configurator and Zero Administration allow local users with physical access to bypass the desktop protection by (1) using <CTRL><ALT><DEL> and kill the process using the task manager, (2) booting the system from a separate disk, or (3) interrupting certain processes that execute while the system is booting. | |||||
| CVE-1999-1445 | 1 Slackware | 1 Slackware Linux | 2016-10-17 | 5.0 MEDIUM | N/A |
| Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords. | |||||
| CVE-1999-1448 | 1 Qualcomm | 2 Eudora, Eudora Light | 2016-10-17 | 5.0 MEDIUM | N/A |
| Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user's mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault. | |||||
| CVE-1999-1454 | 1 Macromedia | 1 Matrix Screen Saver | 2016-10-17 | 4.6 MEDIUM | N/A |
| Macromedia "The Matrix" screen saver on Windows 95 with the "Password protected" option enabled allows attackers with physical access to the machine to bypass the password prompt by pressing the ESC (Escape) key. | |||||
| CVE-1999-1460 | 1 Bmc | 1 Patrol Agent | 2016-10-17 | 7.2 HIGH | N/A |
| BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second argument to the snmpmagt program. | |||||
| CVE-1999-1461 | 1 Sgi | 1 Irix | 2016-10-17 | 7.2 HIGH | N/A |
| inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. | |||||
| CVE-1999-1469 | 1 Hughes Technologies | 1 W3-auth | 2016-10-17 | 7.5 HIGH | N/A |
| Buffer overflow in w3-auth CGI program in miniSQL package allows remote attackers to execute arbitrary commands via an HTTP request with (1) a long URL, or (2) a long User-Agent MIME header. | |||||
| CVE-1999-1490 | 1 Redhat | 1 Linux | 2016-10-17 | 7.2 HIGH | N/A |
| xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable. | |||||
| CVE-1999-1491 | 1 Redhat | 1 Linux | 2016-10-17 | 7.2 HIGH | N/A |
| abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. | |||||
| CVE-1999-1411 | 1 Debian | 1 Debian Linux | 2016-10-17 | 7.5 HIGH | N/A |
| The installation of the fsp package 2.71-10 in Debian GNU/Linux 2.0 adds the anonymous FTP user without notifying the administrator, which could automatically enable anonymous FTP on some servers such as wu-ftp. | |||||
| CVE-1999-1333 | 1 Redhat | 1 Linux | 2016-10-17 | 7.5 HIGH | N/A |
| automatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded. | |||||
| CVE-1999-1332 | 1 Redhat | 1 Linux | 2016-10-17 | 2.1 LOW | N/A |
| gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file. | |||||
| CVE-1999-1334 | 1 Elm Development Group | 1 Elm | 2016-10-17 | 7.5 HIGH | N/A |
| Multiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument. | |||||
